Results 11 to 20 of about 1,916,317 (370)
COMPUTER SECURITY AND SECURITY TECHNOLOGIES [PDF]
With the increasing development of computer and communications technology growth and increasing needs and development of information systems security. The problem of security must be approached with greater caution.
Lazar Stošić, Dragan Veličković
doaj +3 more sources
Understanding Computer Security [PDF]
Few things in society and everyday life have changed in the last 10 years as much as the concept of security. From bank robberies to wars, what used to imply a great deal of violence is now silently happening on the Internet. Perhaps more strikingly, the very idea of privacy – a concept closely related to that of individual freedom – is undergoing such
Nicola Zannone+2 more
core +14 more sources
The paper contains information about hacking types and systems which they are suffered the most cyber attack. The main goal is to introduce people how to protect your systems from several cyber attacks following by special guidelines.
Glīzds, Lauris, Teilāns, Artis
openaire +5 more sources
Computer Security: Competing Concepts [PDF]
This paper focuses on a tension we discovered in the philosophical part of our multidisciplinary project on values in web-browser security. Our project draws on the methods and perspectives of empirical social science, computer science, and philosophy to identify values embodied in existing web-browser security and also to prescribe changes to existing
Helen Nissenbaum+2 more
arxiv +3 more sources
ABC of computing. Computer security. [PDF]
Jamie Payton, A. J. Asbury
openalex +4 more sources
Security has become a matter of utmost importance since the aftermath of September 11th, especially in the area of computer systems. There are many options that a health educator can do as an individual to help secure the computer system at their worksite and in their home.
Edward A. Schmalz
openalex +3 more sources
Privacy and Reader-first Authentication in Vaudenay's RFID Model with Temporary State Disclosure [PDF]
Privacy and mutual authentication under corruption with temporary state disclosure are two significant requirements for real-life applications of RFID schemes. This paper proposes two practical RFID schemes that meet these requirements.
Ferucio Laurentiu Tiplea+2 more
doaj +1 more source
Information Security Governance Framework in Public Cloud a Case in Low Resource Economies in Uganda
The study aimed at exploring the critical enablers to the development and usage of information security governance frameworks for cloud computing in Uganda.
Fredrick Kanobe+2 more
doaj +1 more source
Verifiable image revision from chameleon hashes
In a digital society, the rapid development of computer science and the Internet has greatly facilitated image applications. However, one of the public network also brings risks to both image tampering and privacy exposure.
Junpeng Xu+4 more
doaj +1 more source
One of the most promising enablers for the secure distributed operation of the Internet of Things (IoT) systems could be based on a mathematical construct widely known as blockchain that aims to neglect the system’s centralization and scalability ...
Inna Romashkova+2 more
doaj +1 more source